CVE-2024-24731
Published: 31 January 2025
Description
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Silicon Labs Gecko OS. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the http_download command. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device.
Security Summary
CVE-2024-24731 is a stack-based buffer overflow vulnerability in the http_download command of Silicon Labs Gecko OS. The issue stems from insufficient validation of the length of user-supplied data before it is copied into a stack-based buffer, classified under CWE-120 (Buffer Copy without Checking Size of Input). This flaw affects installations of Silicon Labs Gecko OS, enabling network-adjacent attackers to execute arbitrary code in the context of the device without requiring authentication.
Network-adjacent attackers can exploit this vulnerability without privileges (PR:N) or user interaction (UI:N), though it requires high attack complexity (AC:H) and adjacent network access (AV:A). Successful exploitation allows arbitrary code execution on the affected device, resulting in high impacts to confidentiality, integrity, and availability, as reflected in the CVSS v3.1 base score of 7.5 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
Advisories from Silicon Labs (https://community.silabs.com/a45Vm0000000Atp) and the Zero Day Initiative (ZDI-24-870 at https://www.zerodayinitiative.com/advisories/ZDI-24-870/) provide further details on the vulnerability, including recommended mitigations and patches where available.
Details
- CWE(s)